On this episode of Mistaken Identity, Mike Kiser is joined by Katherine Teitler, VP of Research and Advisory at TAG Cyber. Her recent research illustrates the shifting role of identity—from an IT process to a foundational approach for security. While that’s the starting point, the conversation roams into disinformation, “sources of truth,” identity profiling via personal mu...
Market Views
Authored by: Casey Herman, PwC Partner, ESG Leader; Brad Bauch, PwC Principal, Advisory; and David Manks, SailPoint Technology Alliances & Partner Marketing If there was any doubt about the importance of cybersecurity in the utility industry, one needs simply to look at the recent news. Already this year, there have been two major breaking stories: In May, a cyberattack sh...
It’s undeniable, the world has seen some major changes over the past year. Many of these changes have directly affected enterprises’ security needs. As the world evolves, SailPoint continues to display a strong understanding of existing and emerging challenges across the security landscape solidifying its position as the overall market leader in KuppingerCole’s 2021 Leaders...
Authored by: Matthew Radcliffe Did you know there were more than 29 million healthcare records breached in 2020, and the second-leading cause of those breaches was unauthorized access?[1] If the last year has taught us anything, it’s that life can be unpredictable and sometimes we are forced to change — rapidly. So how does one of the most regulated industries embrace gro...
Authored by: Jody Paterson Now available within IdentityNow, SailPoint’s Access Risk Management enables organizations to get granular visibility into potential access risks within complex ERP systems such as SAP — even before access is approved and provisioned. One of the biggest challenges facing any enterprise is risk management, particularly managing risks associated w...
Authored by: Lori Robinson It’s inevitable that you will run across a situation where the cloud access configured in your environments is misconfigured or over provisioned. This is to be expected due to the high velocity, large volume, and wide variety of changes that are constantly taking place in cloud environments. Even with the most carefully crafted governance framewo...
Authored by: Eric Yuan, Vice President, Global Strategic Partners, SailPoint Detecting risk in an organization is harder than ever before. With a mostly virtual workforce accessing, creating, and storing company and customer confidential information both locally and in cloud storage solutions, the threat surface is more expansive than ever before. Sure, IT has risk monitor...
Authored by: Gretchen Wichmann, Managing Director at Edgile, Identity Practice Leader Identity programs sit at the center of the modern security strategy. Developing the identity strategy and successfully running identity programs—not projects, but actual, robust programs—remains a top priority for many organizations. This leaves program execution an active assignment in t...
You often hear the word “silo” used to describe security processes. Still, originally it was used to describe a structure built to store and preserve bulk material such as harvested grains. Fast forward to the 21st century, and the bulk material within organizations is now digital data. Unfortunately, many of these organizations are also utilizing a siloed approach to manag...
The future of work depends on SaaS and today’s approach needs a remix. How your identity security strategy needs to reconsider what you consider “visibility” and the dangerous gaps that exist with your current approach. If you are like the other CISOs I regularly speak with, you are probably facing a lot of pressing issues related to the rapid adoption of cloud-based servi...